Secure Information Exchange and Performance Implications on Web Server: A Case Study of Secure Socket Layer Protocol
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 134 | Weekly Hits: ⮙1 | Monthly Hits: ⮙14

Research Paper | Computer Science & Engineering | India | Volume 9 Issue 4, April 2020

Secure Information Exchange and Performance Implications on Web Server: A Case Study of Secure Socket Layer Protocol

Simon Peter Khabusi, Rajni Jindal

The recent trend in internet computing and web technology has facilitated steady growth of e-commerce transactions by most global companies. The vast amounts of critical data exchanged over the internet present many security issues. Secure Socket Layer (SSL) protocol is one of the secure connection oriented protocols that enables safe and secure message transmission over the internet by ensuring data confidentiality, authentication and integrity of the communicating parties, that is web server and web client. Many researches have been undertaken on SSL protocol and its effects on web server performance. In this work, a detailed analysis of SSL protocol, its application in secure information exchange and performance implications on web server has been presented. To achieve this objective, we enabled SSL on Apache running on Windows deployment Server 2008 and captured the values of processor time, Network interface, memory available, and average disk queue length for different workloads using the Windows performance monitor and Nagios XI, the most powerful and trusted infrastructure monitoring tool on the market. The data obtained reveals that SSL protocol has detrimental effects on processor time with measurable effect on available memory bytes, whereas minimal effect on average disk queue length was observed. Conclusively, techniques such as distributed computing, SSL certificate reuse, downloading the RSA decryption function and use of Broadcom SSL 800 accelerator have been proposed to overcome the overhead on server performance.

Keywords: SSL Protocol, Web server performance, performance counters, security threats, security services

Edition: Volume 9 Issue 4, April 2020

Pages: 437 - 444

Share this Article

How to Cite this Article?

Simon Peter Khabusi, Rajni Jindal, "Secure Information Exchange and Performance Implications on Web Server: A Case Study of Secure Socket Layer Protocol", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SR20405190701, Volume 9 Issue 4, April 2020, 437 - 444

Enter Your Registered Email Address





Similar Articles with Keyword 'security threats'

Downloads: 102 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article

Downloads: 107 | Weekly Hits: ⮙3 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1360 - 1364

A Review on Security Challenges and Attacks in Wireless Sensor Networks

Paramjit Kour, Lal Chand Panwar

Share this Article

Downloads: 110 | Weekly Hits: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1253 - 1261

Data Hopping in Malicious Environment

S Mohammed Ghouse, Sheethal R

Share this Article

Downloads: 111 | Weekly Hits: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1454 - 1457

Performance Analysis of Hierarchical Routing Protocols of Wireless Sensor Network: A Survey

Sunny Chaudhary

Share this Article

Downloads: 113 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1582 - 1585

A Survey on Face Recognition Techniques for Undersampled Data

Chikkala V S N Pavan Eswar Kumar, Dr. S. Phani Kumar

Share this Article

Similar Articles with Keyword 'security services'

Downloads: 104 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article

Downloads: 107 | Monthly Hits: ⮙11

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1259 - 1361

Security Service Model for Cloud Environment

Shafali Gupta, Neha R Gedam

Share this Article

Downloads: 109 | Monthly Hits: ⮙7

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 1410 - 1412

Device Fingerprinting for Secure User Enrollment using TEE

Prathamesh Raut, Bhushan Patil

Share this Article

Downloads: 110 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1721 - 1723

A Survey and Implementation of Trusted Multi Level SAAS (Security as a Service) Cloud

Papineni. Kalpana, K. Narayana Rao

Share this Article

Downloads: 111 | Monthly Hits: ⮙7

Review Papers, Computer Science & Engineering, India, Volume 2 Issue 2, February 2013

Pages: 609 - 613

Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing

D. Raman, Bojja Vamshikrishna

Share this Article



Top